High severity8.1NVD Advisory· Published May 14, 2026· Updated May 14, 2026
CVE-2026-4030
CVE-2026-4030
Description
The Database Backup for WordPress plugin for WordPress is vulnerable to unauthorized arbitrary file read and deletion in all versions up to, and including, 2.5.2. This is due to the plugin not properly enforcing the return value of its authorization check combined with a user-controlled backup directory parameter. This makes it possible for unauthenticated attackers to read and delete arbitrary files on the server, leading to Sensitive Information Exposure and potential site takeover. Note: This vulnerability is only exploitable in WordPress Multisite environments where the deprecated is_site_admin() function exists.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/wp-db-backup/tags/2.5.2/wp-db-backup.phpnvd
- plugins.trac.wordpress.org/browser/wp-db-backup/trunk/wp-db-backup.phpnvd
- plugins.trac.wordpress.org/browser/wp-db-backup/trunk/wp-db-backup.phpnvd
- plugins.trac.wordpress.org/browser/wp-db-backup/trunk/wp-db-backup.phpnvd
- plugins.trac.wordpress.org/changeset/3510595/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/3e21b550-e1c5-4e23-9999-16c837353da9nvd
News mentions
0No linked articles in our index yet.